Surveillance Self-Defense

The Electronic Frontier Foundation's guide to keeping your online communications safe and secure.

A PROJECT OF THE ELECTRONIC FRONTIER FOUNDATION

Quick
Start

We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. This is Surveillance Self-Defense: our expert guide to protecting you and your friends from online spying.

Read the BASICS to find out how online surveillance works. Dive into our TOOL GUIDES for instructions to installing our pick of the best, most secure applications. We have more detailed information in our FURTHER LEARNING sections. If you’d like a guided tour, look for our list of common SECURITY SCENARIOS.

Popular Guides

Creating Strong Passwords

Your Security Plan

Protecting Yourself on Social Networks

How To: Use Signal on iOS

How To: Use Signal on Android

How To: Enable Two Factor Authentication

Basics

Animated Overview: How Strong Encryption Can Help Avoid Online Surveillance

Animated Overview: How to Make a Super-Secure Password Using Dice

Animated Overview: Protecting Your Device From Hackers

Animated Overview: Using Password Managers to Stay Safe Online

Choosing Your Tools

Communicating with Others

Creating Strong Passwords

Keeping Your Data Safe

Seven Steps To Digital Security

What Should I Know About Encryption?

Why Metadata Matters

Your Security Plan

Tool Guides

How to: Avoid Phishing Attacks

How to: Circumvent Online Censorship

How to: Delete your Data Securely on Linux

How to: Delete Your Data Securely on macOS

How to: Delete Your Data Securely on Windows

How to: Enable Two-factor Authentication

How to: Encrypt Your iPhone

How to: Encrypt Your Windows Device

How to: Use KeePassXC

How to: Use OTR for macOS

How to: Use OTR on Linux

How to: Use PGP for Linux

How to: Use PGP for macOS

How to: Use PGP for Windows

How to: Use Signal for Android

How to: Use Signal on iOS

How to: Use Tor for Linux

How to: Use Tor for Windows

How to: Use Tor on macOS

How to: Use WhatsApp on Android

How to: Use WhatsApp on iOS

Further Learning

A Deep Dive on End-to-End Encryption: How Do Public Key Encryption Systems Work?

Attending Protests (International)

Attending Protests (United States)

Choosing the VPN That's Right for You

Facebook Groups: Reducing Risks

How Do I Protect Myself Against Malware?

Key Concepts in Encryption

Key Verification

Protecting Yourself on Social Networks

The Problem with Mobile Phones

Things to Consider When Crossing the U.S. Border

Security Scenarios

Academic researcher?

Activist or protester?

Human rights defender?

Journalism student?

Journalist on the move?

LGBTQ Youth?

Mac user?

Online security veteran?

Want a security starter pack?